1.0 INTRODUCTIONA computer network and communication is defined as a collection of computers and devicesconnected by communications channels that facilitates communications among users and allowsusers to share resources with other users. Computer Network

A computer network is a system of interconnected computers and peripheral devices. For example, it may connect computers, printers, scanners and cameras. Using hardware and software, these interconnected computing devices can communicate with each other through defined rules of data communications. In a network, computers can exchange and share information and resources. A computer network may operate on wired connections or wireless connections. When two or more networks are linked or connected and are able to communicate with one another using suitable hardware and software, it is called an internetwork.

CommunicationsCommunications is about the transfer of information from a sender, across a distance, to a receiver. Using electricity, radio waves or light, information and data in the form of codes are transmitted through a physical medium such as wire, cable, or even the atmosphere. Therefore, in order to make communications possible from computers, across telephones and radios and back to computers and other digital devices again, there must be a signal translator, which we call-a modem. The modem, which is short for modulator or demodulator, converts digital signals into analog and back again into digital signals for information to move across the telephone line.

Computer NetworkCommunications
2.0 MOBILE COMPUTING
2.1DefinitionMobile computing refers to the use of small and portable computing devices in wireless enabled networks that provide wireless connections to a internet or central main server. These devices include laptops, notebook PCs, tablet PCs, palmtops, personal digital assistant (PDAs) and other hand held devices. A radio-signaling device is installed inside these devices for receiving and transmitting electronic data. Mobile computing has enabled users to remain connected while on the move. High end users can opt for satellite based networking which provides wireless connectivity anywhere in the world. However, this technology is costly and will take many years to become as affordable as Wi-Fi and WiMax. 2.2Specification, services, and frequencies of Mobile Computing The latest 4G device from T-mobile is the Samsung Galaxy S 4G.This phone works on T-Mobile's HSPA+ 4G network, which uses a different technical standard than Sprint or Verizon Wireless' 4G networks. The Samsung Galaxy S 4G is the wireless carrier's first smartphone that is capable of delivering theoretical peak download speeds of up to 21 Mbps while in one of T-Mobile's 4G coverage areas. In addition to fast speeds, the Galaxy S 4G has a large,...

...﻿TASK 1
Explain the reference to legal principle and relevant case law, the legal aspect of placing the ‘Klick’ clock in the shop window with a price tag attached.
Ann antiques has a rare ‘Klick’ clock on its shop with price tags of €1,000 attached. In spite of its wording the sign in the window does not constitute a legal offer, it is merely an invitation to treat. Invitation to treat is an indication that the person who invite is willing to enter into a negotiation but it is not yet prepared to be bound. This case may be seen in Fisher v Bell (1961). It was held that having switch-blade knives in the window of a shop was not the same as offering them for sale.
TASK 2
Analyze the reference to legal principle and relevant because law, the legal effect of the event that transpired between Ann and Beth ignoring the conversation that took place between Carol and Beth and advice as to whether the valid contract exist between them.
The original invitation to treat at €1,000 was met by an offer from Beth which offers €500 on the ‘Klick’ clock. After Ann received an offer from Beth, Ann made a counter offer on the clock that she would sell €750 for it. It is up to Beth to decide whether to accept the offer or not. A counter offer arises when the offeree tries to change the terms of an original offer.
For example, the Hyde v Wrench (1940) case. In that case, on 6th June, Wrench offered to sell his estate to Hyde for £1,000 but...

...This judgment is subject to final editorial corrections approved by the
court and/or redaction pursuant to the publisher’s duty in compliance
with the law, for publication in LawNet and/or the Singapore Law
Reports.
BNJ (suing by her lawful father and litigation
representative, B)
v
SMRT Trains Ltd and another
[2013] SGHC 286
High Court — Suit No 432 of 2011
Vinodh Coomaraswamy JC (as he then was)
29–31 October 2012; 1–2, 5–9, 19–20 November 2012; 11 March 2013
Tort — Negligence — Breach of Duty
Tort — Occupier’s Liability — Who is an Occupier
Tort — Negligence — Res Ipsa Loquitur
Tort — Breach of Statutory Duty — Essential Factors
Contract — Contractual Terms — Implied Terms
31 December 2013
Judgment reserved
Vinodh Coomaraswamy J:
1
On 3 April 2011, a train coming into the Ang Mo Kio MRT station
(“AMK Station”) struck the plaintiff, causing her tragic and life-changing
injuries. She was then just fourteen years old. In these proceedings, she seeks
damages from two defendants for the injuries she suffered on that day. The
first defendant is SMRT Trains Ltd (“SMRT”). SMRT is a public transport
operator and holds the license to operate the mass rapid transit (“MRT”)
system along the North-South line. SMRT operates AMK Station and the train
which injured the plaintiff. The second defendant is the Land Transport
Authority of Singapore (“the LTA”). The LTA is a statutory board charged
BNJ v SMRT Trains Ltd...

...UNIVERSITY IN BOSNIA AND HERZEGOVINA
Research Paper
Cyberlaw in the united states
Introduction
Cyberlaw represents a part of civil and criminal law that concerns the use of computers, and activities performed over the internet and other networks. Besides, cyberlaw deals with the protection of intellectual property rights, freedom of speech, and public access to information. The cyberlaw in the United States includes regulations established by Congress, legislature and courts. One of the main function of cyberlaw is to resolve disputes that result from the wrongful use of computers and the internet. As the law of cyber space, as envisioned by William Gibson in his novel “Neuromancer”1, Cyberlaw addresses the issues of virtual property and virtual persons. There are two main types of internet “behaviors” that are prohibited by the United States Cyberlaw; cyber harassment and cyber stalking. While the two situations usually involve many of the same online tactics, cyber stalking is almost always characterized by the stalker relentlessly pursuing his\her victim online and is much more likely to include some form of offline attack. This offline aspect makes it a more serious...

...CyberLaws Notes
Adv. Ravindra T. Jadhav
Book referred :- A Practical Guide to Information Technology Act, 2000
Author : Nitant P. Trilokekar
Publisher : Snow White
Information Technology Act, 2000 at Glance
This Act is result of a resolution passed at the UNO Since jurisdiction is always the stumbling block in the prosecution of internet crimes, co-operation is sought from member countries by the United Nations.
The Act has introduced a concept of Digital Signature. Each technique having varying degrees of security and ease of operation.
Futures of Internet affecting daily lives
1. E-mail
2. Surfing for information
3. Net Telephone
4. Chat
5. Shopping
6. Banking
Cyber Crimes
1. Computer network beak-ins
2. Industrial espionage
3. Copyrighyt piracy
4. Software piracy
5. Child pornography
6. E-mail bombing
7. Password snuffers
8. Spoofing
9. Credit card fraud
10. Cyber squatting
11. Misleading search words
Some of the important Definition:
Adjudication Officer: (S. 2.c)
Adjudication officer means adjudication officer appointed under sub section 1 of section 46.
Power:
1. For the purpose of adjudging under this Chapter when any person has committed a contravention of any of the provision of this Act or any rule, regulation , direction or order made by Central Government .
2. To conduct the inquiry
3. shall have the power of a civil court...

...What Are CyberLaws?
CyberLaws relate to the regulations that affect the transactions of individuals in Cyber Space namely the imaginary transaction area that seems to exist when two computers exchange data.
These laws can be divided into four broad categories namely,
1. Laws Relating to Digital Contracts
2. Laws Relating to Digital Property
3.Laws Relating to Digital Rights
4. Law of Cyber Crimes
The Law of Digital Contracts:
Contracts are the lifeblood of business. They are agreements between two or more parties which can be enforced in a Court of Law. The Information Technology Act 2000 (ITA-2000) has given legal recognition in India for “Electronic Documents” and “Digital Signatures” so that in any context, if a document is to be in written form and signed for it to be legally valid, the document can be rendered as an Electronic Document and “Digitally Signed”.
There are a few documents which are exempted from this recognition and they include documents relating to transfer or sale of immovable properties, wills, power of attorney documents, Trust deeds, promissory Notes and Bills of Exchange. Excepting these exempted cases therefore, in India, Electronic documents have an universal recognition today.
The...

Study Tools

Company

Follow

{"hostname":"studymode.com","essaysImgCdnUrl":"\/\/images-study.netdna-ssl.com\/pi\/","useDefaultThumbs":true,"defaultThumbImgs":["\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_1.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_2.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_3.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_4.png","\/\/stm-study.netdna-ssl.com\/stm\/images\/placeholders\/default_paper_5.png"],"thumb_default_size":"160x220","thumb_ac_size":"80x110","isPayOrJoin":false,"essayUpload":false,"site_id":1,"autoComplete":false,"isPremiumCountry":false,"userCountryCode":"US","logPixelPath":"\/\/www.smhpix.com\/pixel.gif","tracking_url":"\/\/www.smhpix.com\/pixel.gif","cookies":{"unlimitedBanner":"off"},"essay":{"essayId":36594781,"categoryName":"Organizations","categoryParentId":"3","currentPage":1,"format":"text","pageMeta":{"text":{"startPage":1,"endPage":6,"pageRange":"1-6","totalPages":6}},"access":"premium","title":"Malaysian Cyber Law and Electronic Government Law","additionalIds":[17,7,93,5],"additional":["Literature","Education","Education\/Greek System","Computer Science"],"loadedPages":{"html":[],"text":[1,2,3,4,5,6]}},"user":null,"canonicalUrl":"http:\/\/www.studymode.com\/essays\/Malaysian-Cyber-Law-And-Electronic-Government-1273575.html","pagesPerLoad":50,"userType":"member_guest","ct":10,"ndocs":"1,500,000","pdocs":"6,000","cc":"10_PERCENT_1MO_AND_6MO","signUpUrl":"https:\/\/www.studymode.com\/signup\/","joinUrl":"https:\/\/www.studymode.com\/join","payPlanUrl":"\/checkout\/pay","upgradeUrl":"\/checkout\/upgrade","freeTrialUrl":"https:\/\/www.studymode.com\/signup\/?redirectUrl=https%3A%2F%2Fwww.studymode.com%2Fcheckout%2Fpay%2Ffree-trial\u0026bypassPaymentPage=1","showModal":"get-access","showModalUrl":"https:\/\/www.studymode.com\/signup\/?redirectUrl=https%3A%2F%2Fwww.studymode.com%2Fjoin","joinFreeUrl":"\/essays\/?newuser=1","siteId":1,"facebook":{"clientId":"306058689489023","version":"v2.9","language":"en_US"}}